Post-Quantum Digital Signature: Verkle-Based HORST

The security of commonly used cryptographic systems like RSA and ECC might be threatened by the future development of quantum computing. Verkle-based HORST decreases the size of signatures by 75% (from 12.8 KB to 3.2 KB) and enables O(1)-sized proofs by replacing Merkle trees with Verkle trees. Beca...

Full description

Saved in:
Bibliographic Details
Main Authors: Maksim Iavich, Tamari Kuchukhidze, Razvan Bocu
Format: Article
Language:English
Published: MDPI AG 2025-05-01
Series:Journal of Cybersecurity and Privacy
Subjects:
Online Access:https://www.mdpi.com/2624-800X/5/2/28
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1839653737201664000
author Maksim Iavich
Tamari Kuchukhidze
Razvan Bocu
author_facet Maksim Iavich
Tamari Kuchukhidze
Razvan Bocu
author_sort Maksim Iavich
collection DOAJ
description The security of commonly used cryptographic systems like RSA and ECC might be threatened by the future development of quantum computing. Verkle-based HORST decreases the size of signatures by 75% (from 12.8 KB to 3.2 KB) and enables O(1)-sized proofs by replacing Merkle trees with Verkle trees. Because verification shifts from O(log t) to constant time, it is ideal for blockchain and IoT applications that require short signatures and fast validation. In order to increase efficiency, this study introduces Verkle-based HORST, a hash-based signature method that uses Verkle trees. Our primary contributions are the following: a formal security analysis proving maintained protection levels under standard assumptions; a thorough performance evaluation demonstrating significant improvements in signature size and verification complexity in comparison to conventional Merkle tree approaches; and a novel signature construction employing polynomial commitments to achieve compact proofs. The proposed approach has a lot of benefits for real-world implementation, especially when dealing with situations that call for a large number of signatures or settings with limited resources. We offer comprehensive implementation instructions and parameter choices to promote uptake while preserving hash-based cryptography’s quantum-resistant security features. Our findings suggest that this method is a good fit for post-quantum cryptography systems’ standardization.
format Article
id doaj-art-c66e9d0352dc4b0bacb80bc6a74d0862
institution Matheson Library
issn 2624-800X
language English
publishDate 2025-05-01
publisher MDPI AG
record_format Article
series Journal of Cybersecurity and Privacy
spelling doaj-art-c66e9d0352dc4b0bacb80bc6a74d08622025-06-25T13:59:09ZengMDPI AGJournal of Cybersecurity and Privacy2624-800X2025-05-01522810.3390/jcp5020028Post-Quantum Digital Signature: Verkle-Based HORSTMaksim Iavich0Tamari Kuchukhidze1Razvan Bocu2Department of Computer Science, Caucasus University, 0102 Tbilisi, GeorgiaDepartment of Computer Science, Caucasus University, 0102 Tbilisi, GeorgiaDepartment of Mathematics and Computer Science, Transilvania University of Brasov, 500036 Brasov, RomaniaThe security of commonly used cryptographic systems like RSA and ECC might be threatened by the future development of quantum computing. Verkle-based HORST decreases the size of signatures by 75% (from 12.8 KB to 3.2 KB) and enables O(1)-sized proofs by replacing Merkle trees with Verkle trees. Because verification shifts from O(log t) to constant time, it is ideal for blockchain and IoT applications that require short signatures and fast validation. In order to increase efficiency, this study introduces Verkle-based HORST, a hash-based signature method that uses Verkle trees. Our primary contributions are the following: a formal security analysis proving maintained protection levels under standard assumptions; a thorough performance evaluation demonstrating significant improvements in signature size and verification complexity in comparison to conventional Merkle tree approaches; and a novel signature construction employing polynomial commitments to achieve compact proofs. The proposed approach has a lot of benefits for real-world implementation, especially when dealing with situations that call for a large number of signatures or settings with limited resources. We offer comprehensive implementation instructions and parameter choices to promote uptake while preserving hash-based cryptography’s quantum-resistant security features. Our findings suggest that this method is a good fit for post-quantum cryptography systems’ standardization.https://www.mdpi.com/2624-800X/5/2/28quantum cryptographyMerkle treeHORSHORSThash-based digital signaturesVerkle tree
spellingShingle Maksim Iavich
Tamari Kuchukhidze
Razvan Bocu
Post-Quantum Digital Signature: Verkle-Based HORST
Journal of Cybersecurity and Privacy
quantum cryptography
Merkle tree
HORS
HORST
hash-based digital signatures
Verkle tree
title Post-Quantum Digital Signature: Verkle-Based HORST
title_full Post-Quantum Digital Signature: Verkle-Based HORST
title_fullStr Post-Quantum Digital Signature: Verkle-Based HORST
title_full_unstemmed Post-Quantum Digital Signature: Verkle-Based HORST
title_short Post-Quantum Digital Signature: Verkle-Based HORST
title_sort post quantum digital signature verkle based horst
topic quantum cryptography
Merkle tree
HORS
HORST
hash-based digital signatures
Verkle tree
url https://www.mdpi.com/2624-800X/5/2/28
work_keys_str_mv AT maksimiavich postquantumdigitalsignatureverklebasedhorst
AT tamarikuchukhidze postquantumdigitalsignatureverklebasedhorst
AT razvanbocu postquantumdigitalsignatureverklebasedhorst